Publications

Export 1425 results:
Author [ Title(Asc)] Type Year
Filters: First Letter Of Last Name is H  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Hicks MW.  2007.  Analyzing information flow. Conference on Programming Language Design and Implementation: Proceedings of the 2007 workshop on Programming languages and analysis for security.
Falk J, Zebelein C, Keinert J, Haubelt C, Teich J, Bhattacharyya SS.  2011.  Analysis of SystemC actor networks for efficient synthesis. ACM Trans. Embed. Comput. Syst.. 10(2):18:1-18:34.
Diehl S, Diehl F, El-Sayed NM, Clayton C, Hoheisel JD.  2002.  Analysis of stage-specific gene expression in the bloodstream and the procyclic form of Trypanosoma brucei using a genomic DNA-microarray. Molecular and Biochemical Parasitology. 123(2):115-123.
Varna AL, He S, Swaminathan A, M. Wu.  2007.  Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia. Image Processing, 2007. ICIP 2007. IEEE International Conference on. 2:II-133-II-136-II-133-II-136.
Condon E, He A, Cukier M.  2008.  Analysis of Computer Security Incident Data Using Time Series Models. :77-86.
Hannenhalli S, Russell RB.  2001.  Analysis and prediction of protein functional sub-types from protein sequence alignments. EP20000203764(EP1096411)
Hannenhalli S, Russell RB.  2000.  Analysis and prediction of functional sub-types from protein sequence alignments. Journal of Molecular Biology. 303(1):61-76.
Han B, Ji L, Lee S, Bhattacharjee B, Miller RR.  2009.  All Bits Are Not Equal - A Study of IEEE 802.11 Communication Bit Errors. INFOCOM 2009, IEEE. :1602-1610.
Condon A, Deshpande A, Hellerstein L, Wu N.  2009.  Algorithms for distributional and adversarial pipelined filter ordering problems. ACM Trans. Algorithms. 5(2):24:1–24:34-24:1–24:34.
Dhaliwal S, Gupta SK, Huang J, Priyadarshini A.  2003.  Algorithms for computing global accessibility cones. Journal of Computing and Information Science in Engineering. 3:200-200.
Agarwal PK, Guibas LJ, Edelsbrunner H, Erickson J, Isard M, Har-Peled S, Hershberger J, Jensen C, Kavraki L, Koehl P et al..  2002.  Algorithmic issues in modeling motion. ACM Comput. Surv.. 34(4):550-572.
Agarwal PK, Guibas LJ, Edelsbrunner H, Erickson J, Isard M, Har-Peled S, Hershberger J, Jensen C, Kavraki L, Koehl P et al..  2002.  Algorithmic issues in modeling motion. ACM Comput. Surv.. 34(4):550-572.
Demaine ED, Hajiaghayi MT, Kawarabayashi K.  2005.  Algorithmic graph minor theory: Decomposition, approximation, and coloring. Foundations of Computer Science, 2005. FOCS 2005. 46th Annual IEEE Symposium on. :637-646.
Horvitz E, Getoor L, Guestrin C, Hendler J, Konstan J, Subramanian D, Wellman M, Kautz H.  2010.  AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):103-114.
Horvitz E, Getoor L, Guestrin C, Hendler J, Konstan J, Subramanian D, Wellman M, Kautz H.  2010.  AI Theory and Practice: A Discussion on Hard Challenges and Opportunities Ahead. AI Magazine. 31(3):103-114.
Ertugay O, Hicks MW, Smith J, Kornblum J.  2000.  Agents in Network Management. Technical Reports (CIS).
El-Sayed NM, Hegde P, Quackenbush J, Melville SE, Donelson JE.  2000.  The African trypanosome genome. International Journal for Parasitology. 30(4):329-345.
HAMMOUD R, Porikli F, Davis LS.  2010.  Advanced tracking systems: computational approaches to be introduced to new series. Augmented vision & reality. 1
Doermann D, Sauvola J, Haapakoski S, Kauniskangas H, Seppanen T, Pietikainen M.  1997.  ADistributed Management System for Testing Document Image Database Analysis Algorithms. ICDAR. :989-995.
W Easterday R, Kausrud KL, Star B, Heier L, Haley BJ, Ageyev V, Colwell RR, Stenseth NChr.  2012.  An additional step in the transmission of Yersinia pestis? The ISME Journal. (2):231-236.
W Easterday R, Kausrud KL, Star B, Heier L, Haley BJ, Ageyev V, Colwell RR, Stenseth NChr.  2012.  An additional step in the transmission of Yersinia pestis? The ISME Journal. (2):231-236.
Canetti R, Halevi S, Katz J.  2004.  Adaptively-Secure, Non-Interactive Public-Key Encryption. Model reduction methods for vector autoregressive processes. :150-150.
Canetti R, Halevi S, Katz J.  2005.  Adaptively-secure, non-interactive public-key encryption. Theory of Cryptography. :150-168.
Hellerstein JM, Franklin MJ, Chandrasekaran S, Deshpande A, Hildrum K, Madden S, Raman V, Shah MA.  2000.  Adaptive query processing: Technology in evolution. IEEE Data Engineering Bulletin. 23(2):7-18.
Hellerstein JM, Franklin MJ, Chandrasekaran S, Deshpande A, Hildrum K, Madden S, Raman V, Shah MA.  2000.  Adaptive query processing: Technology in evolution. IEEE Data Engineering Bulletin. 23(2):7-18.

Pages